Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza +4 more
wiley +1 more source
Attack Resilient Microgrid: Impact Characterisation, Online Anomaly Detection and Mitigation
This paper proposes an attack‐resilient control framework for grid‐connected microgrids that enable real‐time detection and mitigation of stealthy cyber‐physical attacks on control and measurement signals. Using an online LSTM‐based anomaly detection system and a model‐based mitigation strategy, the framework maintains near‐optimal performance even ...
Nazmus Saqib +3 more
wiley +1 more source
SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security
Traditional password-based authentication mechanisms exhibit significant security vulnerabilities, prompting the adoption of Multi-Factor Authentication (MFA) to enhance user verification.
Afjal H. Sarower +4 more
doaj +1 more source
Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali +4 more
wiley +1 more source
Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa +5 more
wiley +1 more source
MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain +2 more
doaj +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri +2 more
doaj +1 more source
Agent‐based ARP cache poisoning detection in switched LAN environments
Address resolution protocol (ARP) cache poisoning is mostly used to perform man‐in‐the‐middle (MITM) and denial of service (DoS) attacks for sniffing and network services disruption, respectively, in switch LAN networks.
Daniyal Sakhawat +3 more
doaj +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source

